Survey of anonymity and authentication in P2P networks

被引:5
|
作者
Wang X. [1 ,2 ]
Yang L. [3 ]
Sun X. [1 ]
Han J. [4 ]
Liang W. [1 ]
Huang L. [5 ]
机构
[1] School of Computer and Communication, Hunan University, Changsha
[2] College of Information and Engineering, Xiangtan University, Xiangtan
[3] School of Journalism and Communication, Hunan University, Changsha
[4] School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi
[5] College of Mathematics and Econometrics, Hunan University, Changsha
关键词
Anonymity; Authentication; P2P; Traceability;
D O I
10.3923/itj.2010.1165.1171
中图分类号
学科分类号
摘要
Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. While anonymity related issues have been extensively studied in peer-to-peer (P2P) systems, numerous concerns have been raised about the issue of providing authentic partners in P2P systems. In addition, the network authority requires authentication so that misbehaving entities in the network remain traceable. This study analyzes this problem and reviews related researches. Besides, we also advise some possible methods for this problem. © 2010 Asian Network for Scientific Information.
引用
收藏
页码:1165 / 1171
页数:6
相关论文
共 50 条
  • [1] Authentication with controlled anonymity in P2P systems
    Wierzbicki, A
    Zwierko, A
    Kotulski, Z
    PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 871 - 875
  • [2] Client and server anonymity preserving in P2P networks
    Kim, Byungryong
    SEMANTIC WEB - ASWC 2006, PROCEEDINGS, 2006, 4185 : 689 - 695
  • [3] An Anonymity Scheme Based on Pseudonym in P2P Networks
    Peng Hao
    Lu Songnian
    Li Jianhua
    Zhang Aixin
    Zhao Dandan
    CHINA COMMUNICATIONS, 2010, 7 (06) : 157 - 160
  • [4] Agyaat: mutual anonymity over structured P2P networks
    Singh, Aarneek
    Gedik, Bugra
    Liu, Ling
    INTERNET RESEARCH, 2006, 16 (02) : 189 - 212
  • [5] Preserving Receiver's Anonymity for Circular Structured P2P networks
    Naghizadeh, Alireza
    Berenjian, Samaneh
    Razeghi, Behrooz
    Shahanggar, Saghi
    Pour, Nima Razagh
    2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 71 - 76
  • [6] MuON: Epidemic based mutual anonymity in unstructured P2P networks
    Bansod, Neelesh
    Malgi, Ashish
    Choi, Byung K.
    Mayo, Jean
    COMPUTER NETWORKS, 2008, 52 (05) : 915 - 934
  • [7] Survey of search and optimization of P2P networks
    Kang, Cai
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (03) : 211 - 218
  • [8] Survey of search and optimization of P2P networks
    Cai Kang
    Peer-to-Peer Networking and Applications, 2011, 4 : 211 - 218
  • [9] Search methods in P2P networks: A survey
    Sakaryan, German
    Wulff, Markus
    Unger, Herwig
    INNOVATIVE INTERNET COMMUNITY SYSTEMS, 2006, 3473 : 59 - 68
  • [10] Authentication with P2P agents
    Ghanea-Hercock, R
    BT TECHNOLOGY JOURNAL, 2003, 21 (04) : 146 - 152